Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| xwiki | xwiki-platform | >= 6.0-rc-1, < 13.10.10 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-29204.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-29210 | 10.0 CRITICAL | org.xwiki.platform:xwiki-platform-notifications-ui Eval Injection vulnerability |
| CVE-2023-29209 | 10.0 CRITICAL | org.xwiki.platform:xwiki-platform-legacy-notification-activitymacro Eval Injection vulnera |
| CVE-2023-29205 | 10.0 CRITICAL | org.xwiki.platform:xwiki-platform-rendering-xwiki vulnerable to stored cross-site scriptin |
| CVE-2023-29206 | 9.1 CRITICAL | org.xwiki.platform:xwiki-platform-skin-skinx vulnerable to basic Cross-site Scripting by e |
| CVE-2023-29202 | 9.1 CRITICAL | org.xwiki.platform:xwiki-platform-rendering-macro-rss Cross-site Scripting vulnerability |
| CVE-2023-29201 | 9.1 CRITICAL | org.xwiki.commons:xwiki-commons-xml Cross-site Scripting vulnerability |
| CVE-2023-29207 | 8.9 HIGH | Improper Neutralization of Script-Related HTML Tags (XSS) in the LiveTable Macro |
| CVE-2023-29208 | 7.5 HIGH | Data leak through deleted documents |
| CVE-2023-29203 | 3.7 LOW | Unauthenticated user can have information about hidden users on subwikis through uorgsugge |
No comments yet